Cyber Conflict

Digital Technologies and Security: Towards a Recomposition of the Strategic Field of Information Warfare?

Abstract:

Digital technologies are often described as transforming security and war, yet their strategic effects remain contested. This article argues that cyber capabilities and related digital infrastructures are better understood as recomposing the strategic field rather than inaugurating a discrete Revolution in Military Affairs. Drawing on large-N datasets of interstate cyber incidents, illustrative case studies, and policy and doctrinal documents, it traces how digital tools reshape instruments of coercion, diversify relevant actors beyond states, and blur domestic and external spaces of security. The analysis highlights governance dilemmas for deterrence, alliance coordination, and the regulation of platform power.

Fitting the Artificial Intelligence Approach to Problems in DoD

Abstract: 

Emerging and disruptive technologies, due to advances made over the last couple of decades, have become the centrepiece of Department of Defense (DoD) concerns about national security. The technologies are unique because they can both benefit and hinder the DoD from its mission. Artificial Intelligence (AI) is revered in DoD circles as one of the most important of these technologies because of its potential as an absolute ‘gamechanger’ in cybersecurity operations. In this study, the focus is on the DoD fitting the Artificial Intelligence approach to its problems in a time of limited and diminishing resources.

A Technical and Policy Toolkit for Cyber Deterrence and Stability

Abstract:

This study seeks to assist policymakers and scholars in building a theoretical, policy, and technical framework to address cyber conflict.Based on an analysis of deterrence theory and application and prior arms control regimes, the study presents a toolkit of policies and actions for national governments based on elements of deterrence and arms control that analysis demonstrates are potentially applicable to cyber conflict.The study illustrates how these could be prospectively applied in a treaty framework to facilitate attribution of hostile cyber actions.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS
ICT

M

N

NEC
NSA
NSS

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com